4.7 Article

A data-driven approach to anomaly detection and vulnerability dynamic analysis for large-scale integrated energy systems

期刊

ENERGY CONVERSION AND MANAGEMENT
卷 234, 期 -, 页码 -

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.enconman.2021.113926

关键词

Integrated energy system; Anomaly detection; Vulnerability analysis; Data-driven; Complex network theory

资金

  1. National Natural Science Foundation of China [51904316]
  2. China University of Petroleum, Beijing [2462020YXZZ045]

向作者/读者索取更多资源

The study introduces a method to detect anomalies in an integrated energy system and analyze the system's vulnerability. By combining anomaly detection and complex network theory modeling, the approach effectively exposes security vulnerabilities in the system.
In an integrated energy system (IES), the operating state of each energy subsystem changes relatively frequently, which can seriously threaten the security of IES operation. A systematic data-driven approach is proposed for detecting anomalies and analyzing the dynamics of IES vulnerability. Firstly, an anomaly detection method is introduced to determine whether there are anomalies in the system operation. The method can be set up even if the data labels for discriminating the anomalies are unknown, often the cause in practice. Secondly, a method of complex network phase theory is proposed to model information propagation among IES nodes representative of the IES physical entities. Complex network models can then be constructed to describe the system behavior in different operating conditions and over different time horizons. The degree centrality, betweenness centrality, and closeness centrality are used as indications to analyze changes in IES vulnerability. Finally, a method is proposed to identify the critical points of the IES from the point of view of its vulnerability. The new approach is applied to analyze the vulnerability of an IES in Spain. The results show that the proposed methods allow revealing system anomalies, vulnerability and weaknesses. Outcomes from an analysis by these methods can be used by managers to take defensive measures in advance for preventing and mitigating the impact of potential factors and threats on the IES.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据